Assignment title: Information


King Abdul-Aziz University Department of Computer Science March 3, 2017 Proposal for Designing a Flexible Architecture based on mobile agents for Executing Query in Cloud Databases Proposed By : Salah Alshammari Supervised By : Dr. Amin Noaman.   1 Abstract 1.1 Keywords 2 Introduction 3 Related works 4 Goals/Objectives 5 Needs/Problems 6 Proposed Solution 6.1 Virtual server layer 6.2 Cloud computing layer 7 Specifying Agents 8 Security of cloud database 9 Validations 9.1 Proposed Method 10 Conclusion 11 References 1. Abstract This research illuminates the architecture representing the mobile agent based on Cloud databases. Which allows the user to execute queries on the Cloud Database The deployment of cloud computing supports intensive data storage and handles the workload on computers in an efficient way. However, the underlying cloud computing mechanism represents a client server model that has many flaws. In this case, this research publishes the new method of cloud computing by using mobile proxies, thus proposing a structure that responds significantly to the need of users by executing the query in the Cloud Databases. 1.1 Keywords Cloud databases, Cloud Computing, Mobile Agent, Multi-agent System. 2. Introduction The proposed model is considered robust due to which it is objectified to provide consistent and efficient services to the users by executing query in Cloud Databases. Moreover, it is also aimed to enhance the work-related operations incorporated by the clients that are inclined towards addressing the need of the large number of customers and hence, the proposed model is objectified to address the requests from the large number of users. The scalability, validity and reliability of the proposed system can be enlightened. In this instance, the proposed system has been implemented in a travel company, where a client wants to shift his reservation to another city and can determine the adequate airport. The client is required to interact with the website in order to determine the price, time and desired destination. This process can be automated by means of using the cloud computing system assisted by the mobile agents incorporated by Java [10] and platform Aglets [11, 12, 13], in order to ensure the effective transfer of information between the agents. A cloud database can be defined as a database that can be accessed remotely via the Internet from cloud database service provider and application owners pay based on their usage . For example, Amazon Aurora, Google Cloud SQL and Microsoft Azure are cloud database services that are available in the market and offer SQL database services. As a consequence of this evolution on the area of cloud database services, many issues and challenges have been addressed and been under researches. Cloud database services promises include scalability, availability and elasticity. Cloud computing accounts for the numerous technologies that are amalgamated to provide specific services. Its structure encompasses the unidentified computer resources that interrelated in their work mechanism in a specific network. The cloud computing incorporates the pathway between Cloud database and computer, in which the users are not considered as the owners of their servers, however, they are able to access the online services without the requirement of complex infrastructure. In this instance, organizations are not dependent on servers and in-house infrastructure and hence, all the computer applications are being managed via the application servers and browsers. Cloud computing accounts for the numerous technologies that are amalgamated to provide specific services. Its structure encompasses the unidentified computer resources that interrelated in their work mechanism in a specific network (Figure1). The cloud computing incorporates the pathway between internet and computer, in which the users are not considered as the owners of their servers, however, they are able to access the online services without the requirement of complex infrastructure. In this instance, organizations are not dependent on servers and in-house infrastructure and hence, all the computer applications are being managed via the application servers and browsers. Figure 1: Cloud Computing. The cloud computing accounts for the public cloud and private cloud, whereas their combination is known as hybrid cloud (Figure 2). Figure 2: types of cloud computing.  Public Cloud: It incorporates the host applications and also addresses the web applications and prevails in a shared environment and is accessible to unlimited users, whereas it is implemented by third-parties, for example; Google, Amazon etc. It also accounts for the pay-as-you-go model [1].  Private Cloud: It incorporates within the enterprise system and accounts for the deployed infrastructure. In this instance, virtualization is incorporated to utilize the internal technologies to develop and deliver the on-demand services. It ensures the security of data as compared to the public cloud [1].  Hybrid Cloud: It accounts for the amalgamation between the private and public cloud where data and applications are being shared in the organization. The cloud services account for the following three services:  Software as a Service (SaaS) This software us utilized on the network without the prevalence of any download requirements for the local users. The software applications are made accessible via the web-services and are implemented in accordance with the environment proposed by the supplier [2]. In this instance, Amazon S3 is a significant example of SaaS where the web-interface is used for the storage and retrieval of data.  Infrastructure as a Service (IaaS) It accounts for the service-based infrastructure where the resources are used in accordance with the need of users [3]. In this instance, Amazon EC2 incorporates the practical example of IaaS where virtual services are rented for the execution of applications. Platform as a Service (PaaS) It accounts for the services that are provided from the service provider in order to develop and execute applications [4]. In this instance, Hadoop accounts for the PaaS services for the effective management of extensive information. Cloud computing enriches the computing systems by means of offering advanced internet services and incorporates the distributed computing by means of peer-to-peer, web and grid-computing [5]. These cloud computing systems are aimed to provide a virtual infrastructure to the organizations that are highly adaptable in accordance with the user demands. Similarly, multi-agent systems are objectified for the effective means of problem-solving mechanism due to the prevalence of multiple agents and their effective inter-cooperation. The current paper enlightens the scholarly literature based on the mobile agents and cloud computing and proposes a new method of cloud computing by using the mobile agentsتو اقزقيوت. 3. RELATED WORKS: A trust model proposed by Priyank et al. [6] incorporated the security agents that are based on mobile-agents that ensure security for the virtual infrastructure. The entry point of the network remains secure for the cloud users, whereas the suppliers become highly able to manage the data in an efficient and secure manner. Hence, mobile-agents enhance the extent of security and support the monitoring and accounting services under the prevalence of malware in order to keep the client updated about the data so that adequate measures can be implemented to address the malicious situations. acquire helpful info from the virtual machine that the user and service provider will utilize to stay track of privacy of their information and virtual machines. These agents monitor integrity and authenticity of the virtual machine. Security agents will dynamically move within the network, replicate itself per demand and execute the assigned tasks like accounting and monitoring of virtual machines and accounting [6] . PROBLEM STATEMENT: In cloud computing system organizations typically delegates its system administrations and operations to cloud services. though the organization needs to manage the flow and integrity of information further as monitor the malicious activities of cloud service providers. one purpose of failure can not be allowable to permit for any information loss. As shown in Figure 2, the information might not be placed at a central repository however distributed at many geographical nodes within the cloud. This provides many points for security breach therefore permitting straightforward intrusion. Compared to a standard in house computing, it would be difficult to trace the information security breach in an exceedingly environment of cloud computing. the cloud providers do not offer facility of monitoring security in current cloud architecture, location monitoring, users authenticity and hardware integrity, data and software. Also cloud providers don't offer facility of monitoring quantity of resources employed by client. in a very cloud environment users cannot specify wherever their information is placed. clients are worried about the locations of cloud provider systems. moreover, worries like who is controls the decryption and encryption keys, data integrity. To overcome this drawback Priyank et al. [6] propose a system within which the construct of mobile agent is introduces at multiple levels within the cloud infrastructure to induce assured of the security measures taken into consideration by cloud provider. To monitoring resources and their utilization in requesting any new resources if needed and Priyank et al. [6] They used this mobile agent, also, this agent is useful to build trust among various entities communicating to each other by a secure and reliable communication. Figure 2: Cloud Architecture This mobile agent additionally works as a security agent through implementing trusty computing infrastructure by authenticating hardware integrity and software integrity. has studied and recruited some security threats, risks and vulnerabilities related to cloud computing. these seven threats are known as Data Loss/Leakage, Malicious Insiders, Account, Service & Traffic Hijacking, Abuse and Nefarious Use of Cloud Computing, Unknown Risk Profile, Insecure Application Programming Interfaces and Shared Technology Vulnerabilities. ARCHITECTURE: In Priyank et al. paper [6] has delineated however the combination of present research thrusts has the potential to alleviate several of the considerations clogging adoption. they recommend the seamless extension of control from the enterprise into the cloud thru the effective mixture of high-assurance remote integrity of server, and cryptographical protocols supporting computation on cipher text. Priyank et al. [6] offer all the stipulations for cloud security mistreatment mobile agents same as security agents. The proposed model in Priyank et al. paper [6] they have a tendency to implement security at 3 checkpoints within the cloud environment. The first checkpoint is on the communication level within the network, the second at hypervisor within the virtual machine and lastly at every particular instance of virtual machine allotted to every user. And to build this architecture three mobile agents are used in the proposed model [6] and their names is completed as Mobile Agent1,2,3 (MB1,2,3). MB1 is placed at the access point of cloud and is directly under control of the user. MB1 is used for secure transmission establishment among cloud provider and the user exchanging information securely and management of cloud resources on behalf of user. MB2 is used at DOM0 virtual machine. really MB2 mobile agent tracks down every action performed through the service provider in addition the infrastructure provider in DOM0, also reports any abnormal behavior to MB1, that interns notify the user.MB2 additionally checks integrity of applications and drivers running over DOM0. finally, however not the smallest amount, agent MB3 is deployed at every virtual machine instance of the user and tracks all the activities of DOMU virtual machine and monitors each malicious activities of shared virtual machines and additionally DOM0. just in case of any abnormal behavior of the machine it sends notification to MB1, so giving management of information to user. This agent to agent communication is fully encrypted so it is secure from any attack scenarios. A session key is created for communication among agents. and monitors the flow of our data in cloud database. In the above-described figure 3, the location of MB2 and the location of MB3 are shown beside their respective labels. The hypervisor controls communication among user applications and virtual machines. Figure 3: Mobile Agent Based Trust Model PROPOSED METHOD: the cloud environment is taken into account to own 3 elements that are user, cloud service provider and resource pool that is in restraint of the infrastructure provider. the complete procedure may be summarized in following steps: Step-1: Cloud service provider and user should certify one another. this could be performed by username and password or different mechanism. for secure communication, the SSL key is established in this system as shown in Figure 4. Figure 4: Authentication of Client Step-2: After the authentication process, MB1 is transferred from user to service provider site. user and server should check integrity and authenticity of mobile agent as shown in Figure 5. Step-3: MB1 is started and creates a new session key per user side. This key is reserved secret from service provider and then used for secure communication and for hides data from cloud service provider. Step-4: MB1 requests for resources from cloud service provider on the behalf of user according to requisite and service load. Also, MB1 monitor resource usage then post a check on cloud provider aimed at false uses. Figure 5: MB1 send at cloud provider server Step-5: according to the request, Cloud service provider allocates VM’s and other resources. MB2 is installed in DOM0 to monitoring integrity and authenticity of platform, drivers and software’s. this can be used to monitor behavior of DOM0 and attestation of platform. It registers every hardware and drivers for authentication and attestation. Figure 6: Proposed Model Work Flow Step-6: another mobile agent MB3 is installed in each VM allotted to user. MB3 registers itself to MB1. MB3 creates a brand-new try of keys for communication with MB1. MB3 achieves the task of secure communication among VMs and MB1 on client side and monitor behavior of applications synchronized. If resources are assigned at over one hypervisor, at that time distinct MB2 and MB3 are put in at each DOM0 and DOMU. Step-7: Lastly, if the user close the connection, MB3 informs MB1 for withdrawing the allotted resources. also, disconnecting the association. The Open Cloud Computing Federation (OCCF) [7] addresses on the integration between several service providers of cloud computing in order to develop an integrated and uniform interface for the users. It incorporates the phenomena that provides significant fundamentals to address the issues related to the probabilistic concerns. This method is considered to be beneficial due to the prevalence of scalability of unlimited data, resource availability, application of multiple-CCSP and cost efficiency. Most of the issues of cloud computing technology nowadays are attributed to the lack of portability (user’s application will span over multiple CCSPs) and ability (user’s application will deploy on multiple CCSPs) we analyze the issues caused by the 2 defects and also the count measure to all issues once the adoption of OCCF.  Limited scalability : Most of the CCSP claim that they supply infinite scalability for the client, really, with the wide use of cloud computing and also the rapid growth for all users, none of the CCSPs will meet all the requirements of each user.  Unreliable availability of a service really, closure (shutdown) events happened recently with several of the of the CCSP’s cloud computing service, as well as Amazon, Google and Microsoft. Dependence on one CCSP’s service are often bottlenecked on the event of a breakdown since the applying can’t be migrate to a different CCSP and thence the service can vanish from the network. On the contrary, in OCCF, user’s application will migrate to a different CCSP just in case of breakdown, and multiple CCSP’s service are often used at the same time, supply a decent availableness of a service.  Service provider lock-in : Absence of portability makes it not possible for information and application transfer among CCSPs; consequently, the client is barred to a definite CCSP. The OCCF can democratize the whole cloud computing market wherever the little scale competitors will enter and so promote innovation and vitality.  Unable to deployment service over multiple: CCSPs presently, application can’t scale over multiple CCSPs since there's no ability between CCSPs, OCCF will build it attainable for a company to integrate totally different CCSP’s service to supply a lot of valuable service for the top user. The mobile agents based on open cloud-computing federation (MABOCCF) helps in the effective realization of probability and results in the development of an effective OCCF. It has been implied that the implementation of MABOCCF enhances the extent of optimization of accessibility of the resources by 50.35 percent in contrast to the other prevailing systems [8]. We shall see how this architecture can solve most of the existing problems. • Portability The very definition of Mobile agent ensures portability. Each mobile agent runs on a place on the virtual machines (provided by the CCSPs) called Mobile Agent Place (MAP). Mobile agents carrying the application code or user’s tasks can move from one MAP to another MAP independent of the CCSP thereby realizing portability among heterogeneous CCSPs • Interoperability Interoperability problem is now reduced to the negotiation and collaboration among agents which can be effected using agent interoperability standards. 4. Goals/Objectives The cloud computing systems incorporate the client-server model in order to develop the effective communication between the server and clients, which eventually indicates the prevalence of a major drawback in the traditional system design. In this instance, mobile agents are able to ensure the implementation of dynamic applications and can help in the development of a generic framework. The proposed model accounts for the mobile agent that is responsible for the effective transfer of code and data between the client and server in order to carry out the assigned tasks [9]. The proposed model is considered robust due to which it is objectified to provide consistent and efficient services to the users by executing query in Cloud Databases. Moreover, it is also aimed to enhance the work-related operations incorporated by the clients that are inclined towards addressing the need of the large number of customers and hence, the proposed model is objectified to address the requests from the large number of users. The benefits of mobile agents are discussed below:  It tends to be more flexible and ensures the robust nature of transactions.  Developing a secure architecture (tool) of executing queries in cloud databases with taking response time of execution into consideration.  It incorporates the efficient and smart way for the information search and are able to rectify the queries in accordance with the model.  They are able to develop search bases in accordance with each search and hence, they tend to adapt by means of the effective communication between the agents. The proposed model incorporates the mobile-agent method for the development of a cloud computing design and how we executing query in Cloud Databases. 5. Needs/Problems Problem Definition: cloud computing supports the storage of extensive data and addresses the workload of computers in an effective manner. But the basic cloud computing mechanism accounts for the client-server model that has several drawbacks. In this instance, this Architecture enlightens the new method of cloud computing by means of using mobile agents and hence, proposes an architecture that is highly responsive to the need of users. Challenges: With Agent-based architecture We have some challenges: Data security  How to protect data in this architecture? performance  Cost of communication (response time).  Cost of performing computational queries (Server side vs. client side)  How we designing architecture that is highly responsive to the need of users?  Designing a flexible Architecture for Executing Query in Cloud Databases Requirement information needs to be covered: Cloud database services  What is cloud database service?  Cloud DBMS Architecture.  Characteristics of Database-as-a-Service.  Challenges of Database-as-a-Service. Agent-based Architecture  What is Agent-based architecture?  How the Agent-based architecture works?  What is the Components of Agent-based architecture?  What is the Advantages and Disadvantages of Agent-based architecture?  Existing architecture for executing queries on cloud databases 6. Proposed Solution: The proposed framework incorporates two layers and three databases, has been illustrated in Figure 1. Figure 1: Representation of the layers of our system. 6.1 Virtual server layer  It encompasses the layer that has the application that facilitates the client to request the query from the cloud database. It is focused to determine the objective of the user and address the need of its users and help in the achievement of specified tasks. It results in the demand transformation which is further extended to the mediator agent.  This layer incorporates the components that are essential to execute the request implied by the agent-interface and helps in the development of mobile agents on account of the request of users. It also stores the address of task managers in the database and sends and receives the adequate information to ensure the achievement of work objectives. Afterwards, the mediator agents are responsible examine and collect the information that has been requested by the users.  The layer encompasses the transfer agents that are developed by the mediator agent as a result of service request from the cloud database. It is comprised of the mobile agents that are being sent to the task managers in order to determine the adequate services for the service request. 6.2 Cloud computing layer  This layer accounts for the receiving and processing the requests and providing the results. It incorporates the task managers, executor and security agents in order to manage the offered services. 7. Specifying Agents:  Interface Agent This agent allows the users to incorporate adequate interaction with the system and it runs on the device of the users. It is responsible gather user queries for cloud database, forward received queries to the relevant agents and provide results to the users.  User interface: permits the connection with the client so it can collaborate with our system.  Treatment module: the part of this module is to dissect the data of clients and permits gathering data from the graphical interface and after that it makes the request and send it to the (mediator agent).  communication module: is in charge of security interaction between this agent with different agents in this architecture.  Data base: stored all agent knowledge like the information communicated by this agent and the profile of the current client. Figure 2: The interface agent.  Mediator Agent It is responsible to respond to the service request and ensures effective interface between the requested queries and available resources via cloud computing. It generates the mobile agent as a response to the queries in order to forward these requests to the task manager in order to access the required services. It also collects the search results that are required by the users and increases the extent of security.  Management module and control: This module is answerable for looking after all of the activities associated with the execution of a user's query, it additionally continues a list of users and their cloud  Module generation agents: allows the creation of (mobile agents) and specifies where the executions will be start.  Module control agents: this module permits the mediator agent to control every one of the agents made, a mobile agent system need to provide mechanisms to secure execution of agents inside the system.  Communication module: is in charge of security connection between this agent with different agents in the system. Figure 3: The mediator agent.  Analyzer Agent It is responsible to respond to the service request and ensures effective interface between the requested queries from cloud database and available resources via cloud computing. It generates the mobile agent as a response to the queries in order to forward these requests to the task manager in order to access the required services. It also collects the search results that are required by the users and increases the extent of security.  Treatment module: in charge of analyzing the authentication of all clients and the analysis of information or services gave by the cloud layer by means of the transfer agent.  Authentication Security Module: is responsible for authenticate clients of cloud computing and cloud computing corresponding to all client.  Data base: stored all the knowledge of this agent, all information services which may be requested by the client from the cloud database, clients and their authentication, providers of cloud computing and the history of all services presented by each.  communication module: is in charge of security connection between this agent with different agents in the system. Figure 4: The Analyzer agent.  Transfer Agent The transfer agent accounts for the mobile agent that is developed by the mediator agent to assist the completion of the assigned task. These agents address the request by means of interacting with the task manager and then interact with the analyzer agent about the prevalence of the requested information. These agents destroy their prevalence after the accomplishing their tasks.  Mobility Module: permits you to achieve relocation of the agent running from server to cloud or from a cloud to cloud over the system.  Treatment module: on treatment module, the mobile agent may require to run a treatment process .  communication module: is in charge of security connection between this agent with different agents in the system. Figure 5: The Transfer agent.  Task Manager This agent ensures the prevalence of order and facilities the provision of the required information to the agents. It acts as a temporary agent to provide the requested services to the users.  Control and planning module: in charge to support wholly activities associated to the execution of a service, also managing virtual machines in cloud computing.  Communication module: is in charge of security connection between this agent with different agents in the system  Knowledge: it is a database holding a list of virtual machines of cloud computing and their corresponding tasks, also contain all information around planning in cloud computing, the general plan of this agent, agent task, resolutions standards of conflicts between agents cloud and constraints to be respected for all services in the system. Figure 6: The task manager agent.  Security Agent It ensures the security, authentication and integrity of the partners in the cloud database.  Generator degree of safety: is responsible for creates a degree of security for all virtual server resister in cloud computing and needs to request a service from the cloud database.  Authentication and analysis module: the part of this module is responsible for authenticate the virtual server and their client of cloud computing.  Information register: holds information around the virtual servers like registration name and password etc.., so that it can authenticate when connecting, also holds information around the data exchanged between all agents ( signature data ) to confirm their authenticity that draws and it also knows the authorization of all virtual servers (client).  Communication module: is in charge of security connection between this agent with different agents in the system Figure 7: The security agent.  Executor Agent It accounts for the responsiveness towards the mobile agents and is comprised of a communication module that helps in the effective planning and coordination modules, and execution and treatment modules. It encompasses the knowledge of cloud computing and individual knowledge to support its functions.  Communication module: include all the process of management messages in this system, reception messages, filtering and translation of received messages and the formulation and transfer outgoing messages.  Planning and Coordination: in charge for the organization of Cooperation and formulation of offerings to satisfy the goal announced via the task manager.  Execution module: the execution module does no longer include the resources cloud computing, but also it includes the information of the internal resources of cloud computing like application, users and sources of knowledge, others., that permit the realization of the tasks assigned to the local cloud, this module has the function to achieve correspondence among the task assigned to the agent and the inner sources or cloud able to completing this task.  Knowledge of cloud computing: carries information about the organizational and operational rules defined via the cloud, it explains that for this cloud each agent is part of it, a list of all member’s agents, this module additionally includes the information of the rights and obligations of all agents.  Individual knowledge: carries the information about this agent like abilities and skills, status and current workload, that is to say, for each task, it assigned indicators to determine the cost and availability of this task. Figure 8: The Executor Agent 8. Security of cloud database: Our approach describes a secure system of communication between the cloud service provider and users in a cloud, all clients and service providers are expected to be honest within the registration phase After the registration segment is finished, all users or service provider is secure. Figure 14: Proposed method for server registration. Clients should be check themselves in access to cloud services via providing accurate client ID data to access to services thru a virtual server. Figure 15: Proposed method for user registration 9. VALIDATIONS: The scalability, security, validity and reliability of the proposed system can be enlightened by this research. In this instance, the proposed system has been implemented in a travel company, where a client wants to shift its reservation to another city and can determine the appropriate airport. The client is required to interact with the website in order to determine the price, time and desired destination. This process can be automated by means of using the cloud computing system assisted by the mobile agents incorporated by Java [10] and platform Aglets [11, 12, 13], in order to ensure the effective transfer of information between the agents. Figure 16: proposed rules to launch request on virtual server layer User identification will be sent to the agent interface, and then the agent interface will be initiated the identification information and forwarded to the mediator agent, the mediator agent will forward the access to information to the agent analyzer. The system will forward the response from the analyzer to the mediator agent under the prevalence of correct information, otherwise, the request of access will be ignored. the interface agent start secure connection and get the user request and send this request to mediator agent, the mediator initiator will incorporate the development of transfer agents, the transfer agent will move to the cloud in order to provide response to the request. The task manager will request the security agent to determine the prevalence of the arrival of the request, verify the provided information and ensure the security of the system. After that, the security agent will interact with the task manager and under the prevalence of correct information, the process will continue, otherwise, the request will be ignored. Figure 17: proposed rules to launch request on cloud computing layer The executor agent will be initiated. then the executor agent will carry out the assigned task from the requested service. The task manager will forward the result to the transfer agent, which will migrate to our system, then the transfer agent will interact and forward the results to the mediator agent. The mediator agent will forward the results to the analyzer agent. after that, the analyzer agent will sort the results and will respond to the agent in accordance with the acquired results, then the mediator agent will forward the results to the interface agent. And The results will be displayed to the client et end the secure connection. 9.1 Proposed Method: STEP 1: User request will be sent to the agent interface. Figure 11: The software architecture. STEP 2: The agent interface will be initiated and forwarded to the mediator agent. STEP 3: The mediator agent will forward the request and access to information to the agent analyzer. STEP 4: The agent will forwards the response from the analyzer to the mediator agent under the prevalence of correct information, otherwise, the request will be ignored. STEP 5: The mediator initiator will incorporate the development of transfer agents. STEP 6: The transfer agent will move to the cloud in order to provide response to the request. STEP 7: The task manager will request the security agent to determine the prevalence of the arrival of the request, verify the provided information and ensure the security of the system. STEP 8: The security agent will interact with the task manager and under the prevalence of correct information, the process will continue, otherwise the request will be ignored. STEP 9: The executor agent will be initiated. STEP 10: The executor agent will carry out the assigned task from the requested service. STEP 11: The task manager will forward the result to the transfer agent, which will further move towards the cloud system. STEP 12: The transfer agent will interact and forward the results to the mediator agent. STEP 13: The mediator agent will forward the results to the analyzer agent. STEP 14: The analyzer agent will sort the results and will respond to the agent in accordance with the acquired results. STEP 15: The mediator agent will forward the results to the interface agent. STEP 16: The results will be displayed to the client. 10. CONCLUSION: The utilization of cloud computing has been increased by the organizations due to the ease of infrastructure maintenance and ability to address unlimited clients. In this instance, the proposed method utilizes the efficient means of adequate layers that enhance and facilitate the migration of information between user and server. The proposed method utilizes mobile agents and hence, it emphasizes on the need of users in an effective manner. 11. References [1] J. Baraban. (2010). Private cloud, public cloud et hybrid cloud. [Online Source]. Available from: http://mysaas.fr/2010/10/04/private-cloud-public-cloud-et-hybrid-cloud/ [2] Dell EMC. (2016a). Software-as-a-Service (SaaS). Dell EMC. [Online Source]. Available from: https://www.emc.com/corporate/glossary/software-as-a-service.htm [3] Dell EMC. (2016b). What is Infrastructure as a service (IaaS). Dell EMC. [Online Source]. Available from: https://www.emc.com/corporate/glossary/infrastructure-as-a-service.htm [4] Dell EMC. (2016c). What is Platform as-a-service (PaaS). Dell EMC. [Online Source]. Available from: https://www.emc.com/corporate/glossary/platform-as-a-service.htm [5] W. Kim, “Cloud Computing: Today and Tomorrow,” Journal of Object Technology, vol. 8, no. 1, January February 2009, pp. 65-72. [6] Priyank Singh Hada,Ranjita Singh,Mukul Manmohan Meghwal “ Security Agents: A Mobile Agent based Trust Model for Cloud Computing” International Journal of Computer Applications (0975 – 8887) Volume 36– No.12, December 2011. [7] B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I. Llorente , et al. “The Reservoir model and architecture for open federated cloud computing,” IBM Journal of Research and Development, Volume 53, April 2009, in press. [8] Zhang. Z and Zhang. X, “Realization of Open Cloud Computing Federation Based on Mobile Agent“, IEEE, 2009. [9] S. E. Falou : Programmation répartie, optimisation par agent mobile. Thèse du Doctorat de l'université de CAEN, soutenue le 29 Novembre (2006). [10] J. P. Arcangeli, V. Hennebert, S. Leriche, F. Migeon, M. Pantel : Tutoriel JavAct (version 0.5.0), IRIT (20gelts 03). [11] J. P. Arcangeli, V. Hennebert, S. Leriche, F. Migeon, M. Pantel : JavAct 0.5.0 : principes, installation, utilisation et développement d'applications. Rapport de recherche, IRIT/2004-5-R, Février (2004). [12] Danny B. Lance/Mitsuru Oshima: Programming And Deploying Java Mobile Agents with Aglets: Addison -Wesley, 1998, pp 378-- 491. [13] Aglets. (n.d). Welcome to the Aglets web site. Aglets. [Online Source]. Available from: http://aglets.sourceforge.net/